Description
School Management System CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious payloads using boolean-based blind SQL injection techniques to the processlogin endpoint to authenticate as administrator without valid credentials.
Published: 2026-03-26
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

An SQL injection flaw exists in the admin login routine of School Management System CMS 1.0, allowing attackers to inject malicious SQL via the username field. The flaw permits boolean-based blind SQL injection, enabling an attacker to craft payloads that cause the authentication logic to succeed without valid credentials. Once authenticated, the attacker gains full administrative privileges, which can be used to alter data, view confidential information, or further compromise the system. The vulnerability is classified as CWE‑89 and scored at CVSS 7.1, indicating a high risk if exploited.

Affected Systems

The affected product is Wecodex Solutions School Management System CMS version 1.0. No other versions or upstream products are listed as vulnerable.

Risk and Exploitability

The estimated probability of exploitation is low, with an EPSS score of less than 1% and the vulnerability not appearing in the CISA KEV catalog. However, the attack vector requires an application‑level entry point to the processlogin endpoint and the ability to submit crafted username strings. Once access is achieved, an attacker can bypass authentication and perform any administrative action, resulting in full system compromise. Given the CVSS score and the nature of the flaw, it represents a serious security concern for organizations running the vulnerable CMS.

Generated by OpenCVE AI on March 28, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or security advisories for an update or patch that addresses the SQL injection issue and apply it immediately.
  • If no patch is available, modify the application to use parameterized queries for the login routine, ensuring that user input cannot alter SQL statements.
  • Consider implementing a web application firewall or rate‑limiting rules to block suspicious SQL injection patterns against the /processlogin endpoint.

Generated by OpenCVE AI on March 28, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wecodex:school_management_system_cms:1.0:*:*:*:*:*:*:*

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Wecodex
Wecodex school Management System Cms
Vendors & Products Wecodex
Wecodex school Management System Cms

Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description School Management System CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious payloads using boolean-based blind SQL injection techniques to the processlogin endpoint to authenticate as administrator without valid credentials.
Title School Management System CMS 1.0 Admin Login SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Wecodex School Management System Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T13:02:45.335Z

Reserved: 2026-03-26T11:32:22.689Z

Link: CVE-2018-25201

cve-icon Vulnrichment

Updated: 2026-03-26T13:00:57.364Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T12:16:04.653

Modified: 2026-03-27T20:57:19.480

Link: CVE-2018-25201

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:27:56Z

Weaknesses